CN104487993A - Systems and methods for identity authentication using a social network - Google Patents

Systems and methods for identity authentication using a social network Download PDF

Info

Publication number
CN104487993A
CN104487993A CN201380035592.4A CN201380035592A CN104487993A CN 104487993 A CN104487993 A CN 104487993A CN 201380035592 A CN201380035592 A CN 201380035592A CN 104487993 A CN104487993 A CN 104487993A
Authority
CN
China
Prior art keywords
identities
hypothesized
related entities
computer
connection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201380035592.4A
Other languages
Chinese (zh)
Other versions
CN104487993B (en
Inventor
约翰尼斯·菲利普斯·迪·维利尔斯·普里查德
杰西·Cpb·肖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LexisNexis Risk Solutions FL Inc
Original Assignee
LexisNexis Risk Solutions FL Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LexisNexis Risk Solutions FL Inc filed Critical LexisNexis Risk Solutions FL Inc
Publication of CN104487993A publication Critical patent/CN104487993A/en
Application granted granted Critical
Publication of CN104487993B publication Critical patent/CN104487993B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity

Abstract

The utility model discloses systems and methods for identity authentication using a social network. Certain embodiments of the invention may include systems and methods for identity authentication using an social network. According to an exemplary embodiment of the invention, a method is provided for authenticating an identity of a target person. The method can include determining, from a first system graph, connections between one or more hypothetical identities and a plurality of related entities associated with the one or more hypothetical identities; determining, from a second system graph, one or more real entities associated with the target person; identifying matches comprising common real entities associated with the target person and related entities associated with the one or more hypothetical identities based at least in part on the determined connections; and providing an indication of identity authentication of the target person based at least in part on the identified matches.

Description

Social networks is utilized to carry out the system and method for authentication
Technical field
The present invention relates generally to authentication, is specifically related to utilize social networks to carry out authentication.
Background technology
For many enterprises, common service, ecommerce, enforcement and other depend on the system of individual true identity, identity fraud remains the huge challenge of current existence.Such as, the identity information that mechanism may provide based on applicant is opened credit accounts unawares or provides goods and/or service.Unfortunately, some people provides misleading, incorrect, or is the identity information of rogue completely.Although this type of fraud is comparatively rare, its cost is expensive.Technically, swindle offender probably proceeds more complicated swindle plan, particularly when powerful Authentication mechanism is not yet in place for financial institution.
Summary of the invention
Above-mentioned some or all of demands can be solved by some embodiment of the present invention.Some embodiments of the present invention can comprise the system and method utilizing social networks to carry out authentication.According to an exemplary embodiment of the present invention, provide a kind of method for verifying destination object identity.Described method comprises: from the first system figure, determines one or more hypothesized identities and connection between the multiple related entities be associated with this one or more hypothesized identities.Described method comprises: from second system figure, determines one or more real entities be associated with destination object; The match objects of the total real entities be associated with destination object and the related entities be associated with one or more hypothesized identities is comprised at least in part based on determined linkage identification; And the instruction of destination object authentication is provided based on the match objects identified at least in part.
According to another exemplary embodiment of the present invention, provide a kind of system.Described system comprises at least one storer for storing data and computer executable instructions; And at least one processor, it is configured to access at least one storer described, and be further configured to execution computer executable instructions, with from the first system figure, determine one or more hypothesized identities and connection between the multiple related entities be associated with this one or more hypothesized identities; From second system figure, determine one or more real entities be associated with destination object; The match objects of the total real entities be associated with destination object and the related entities be associated with one or more hypothesized identities is comprised at least in part based on determined linkage identification; And the instruction of the authentication of destination object is provided based on the match objects of this identification at least in part.
According to another exemplary embodiment of the present invention, provide a kind of non-transitory computer-readable medium.Described computer-readable medium storage can be performed by one or more processor with the instruction implementing following method, from the first system figure, determines contacting between one or more hypothesized identities and multiple related entities of managing to be associated with this one or more hypothesis; From second system figure, determine one or more real entities be associated with destination object; The match objects of the total real entities be associated with destination object and the related entities be associated with one or more hypothesized identities is comprised at least in part based on determined linkage identification; And the method for the instruction of destination object authentication is provided based on the match objects of this identification at least in part.
Hereinafter will describe other embodiments of the invention, characteristic and other side in detail, and be considered to the present invention's part required for protection.Other embodiments of the invention, characteristic and other side can be understood with reference to detailed description hereafter, accompanying drawing and claims.
Accompanying drawing explanation
With reference now to the following drawings and process flow diagram, accompanying drawing might not be drawn in proportion, and wherein:
Fig. 1 shows according to exemplary embodiment of the present invention, the illustrative block diagram of verification system 100;
Fig. 2 shows according to exemplary embodiment of the present invention, carries out illustrative figure and the subgraph of authentication;
Fig. 3 shows according to exemplary embodiment of the present invention, the illustrative block diagram of system architecture 300;
Fig. 4 shows according to exemplary embodiment of the present invention, the process flow diagram of method.
Embodiment
Below in conjunction with the accompanying drawing showing embodiments of the invention, embodiments of the present invention are described in further detail.But the present invention can multiplex different form embody, and only should not be interpreted as shown embodiment herein; Certainly, these embodiments provided make disclosed by the invention more thorough and complete, and have fully demonstrated scope well-known to those skilled in the art.
In the following description, many details have at large been set forth.But, it is also understood that embodiments of the invention also can not be implemented with these details.In other embodiments, be not shown specifically known method, structure and technology, with not fuzzy understanding of this description.Term " exemplary " herein uses as the synonym of term " embodiment ", and it does not also mean that and represents excellent or best." a certain embodiment " mentioned, " embodiment ", " exemplary embodiment ", " each embodiment " etc., the description all referred to comprises the present invention (multiple) embodiment of special characteristic, structure or characteristic, but is not that each embodiment must comprise these special characteristics, structure or characteristic.In addition, the word " in one embodiment " of Reusability might not refer to same embodiment herein, although it may be.
As used herein, unless otherwise prescribed, the use of ordinal number " first ", " second ", " the 3rd " etc. is all for describing a general object, only represent the different examples of mentioned similar object, instead of the object that so describes of intention hint must according to given order, be no matter time, space, grade or in any other way.
Some embodiment of the present invention can make it possible to verify individual identity based on one or more relation set up in certain network with other people.According to exemplary embodiment of the present invention, this network of system figure representation, and relation (edge) between individual (node) can be determined in network and compares the identity with identifying object with other network system figure.Embodiments of the invention can utilize various visible, hide, network that is public, privately owned, open and/or that close carrys out identity verification.Such as, an open or visible network can comprise the public records about particular individual information, building database etc. that contain.One network opened can include but not limited to the data that can openly obtain, and comprises name, address, marriage information, telephone number etc.This type of open network information by the record that keeps and safeguard, such as, obtained by the record of city, county and/or country.In some of the exemplary embodiments, it is not the information that must be supplied to the public that network that is that hide, privately owned or that close can comprise, as society or a part of contact person, friend, colleague etc. of specialized network.
The information coming from open network is useful especially, comprises the information such as show particular individual and his/her friend, colleague, spouse, room-mate etc. internetwork one or more link, are connected, relation.Such as, can public records be utilized, determine that john smith and Jane Smith had and employ same house together with 2011.Thus can think that john smith is familiar with Jane Smith smoothly with coming out as an article, therefore, in the network closed, two people also may have common connection.
According to exemplary embodiment of the present invention, the network derived by system diagram can comprise social networks, such as: Facebook tM, Linkedin tM, Foursquare tM, Habbo tMdeng.Current, there is more than 200 this type of social network sites in the whole world.This type of social networks needs the bidirectional relationship between individuality usually, therefore, this type of relation in social networks be connected the relation and connection that may be fundamentally different than and be set up by public records.
In one exemplary embodiment, when the first object sends a connection request to the second object, and when this second object agrees to this connection, namely in social networks, establish bidirectional relationship.So, described first object and the second object are all agreed to set up this connection, therefore, have had " two-way " to specify.In one exemplary embodiment, relation can characterize with the progression connected between two parties or quantity further.Such as, a bidirectional relationship isolated can characterize progression=1.According to an exemplary embodiment of the present invention, described second object can have and bidirectional relationship between the 3rd object, and therefore, the relation between described first object and the 3rd object can be considered to (mode with isolated) is the relation of progression=2, etc.According to exemplary embodiment, and as subsequently with reference to accompanying drawing 2 discuss, the total existence connecting (such as: multiple first, second, third, fourth progression etc.) around can be used to strengthen relevant connection.In one exemplary embodiment, around this type of and/or relevant connection can be used to the level of the specific connection of amendment one, such as: from progression=1 to the connection of progression=0.7, wherein, the impact connected around the intensity of connection is also inversely proportional to level.
According to exemplary embodiment, the relation between individuality or connection can utilize graph theory to represent, described graph theory can be used to describe the technical ability that between individuality, multiple different relationship type is shared.Figure is defined as the connecting object that a group is referred to as summit or node.Connection between object is called edge.Theoretical formal definition one figure that divides into groups is an ordered pair, and wherein, N is a group node, and E is one group of edge.Each edge is written as a pair node.Such as, a figure can comprise following 9 nodes: N={1,2,3,4,5,6,7,8,9}, and wherein, internodal direct relation can be represented by the edge of the list comprising a pair node.Such as, a figure can form by with lower limb: E={{1,2}, { 1,3}, { Isosorbide-5-Nitrae }, { 1,5}, { 1,6}, { 1,7}, { 1,8}, { 3,6}, { 3,7}, { 6,9}}.In this embodiment, node number 1 is connected with other all nodes except node number 9 by first order edge.Node number 1 is connected with node number 9 indirectly by node number 6.Because node number 1 is all connected with node number 6 with node number 3, and node number 1 is connected with node number 3, therefore { 1, the 6} and { existence of 3,6}, as { the such connection of 1,3} can be considered to have stronger connection (level is less than 1) owing to connecting.
According to exemplary embodiment of the present invention, figure oriented or undirected, its group is to being respectively orderly or invisible.Such as, digraph, expression be connect direction there is certain meaning.According to exemplary embodiment of the present invention, all edges be bi-directionally connected are two-way.In addition, as previously discussed, the progression of node represents by the number of edges away from center or destination node.Grouping theory in this situation provides a kind of description one group node and edge and the means compared itself and another.
In public records space, each checking or node can represent the entity extracted from the several data depositing in thesaurus.According to exemplary embodiment, node can based on the quantity of the public records of two entities set up together and type cluster, such as: by marriage, divorce, share assets, contract, evaluate recorded, automobile, boats and ships and flight certificate and record live the shared address exceeding the several months together.Shared record type also can contribute to the intensity of expression two relationships between nodes.Such as, shared ownership of assets can have the connection stronger than shared address.According to an exemplary embodiment, each cluster in figure can comprise barycenter node identities and first, second, third, etc. progression node Association Identity.
According to exemplary embodiment of the present invention, destination object possibly cannot affect the social network data around him or she fully, and these data can be used for verifying his or her identity.In the exemplary embodiment, the quantity about the checking details of the related object be connected with target identities is larger, and target identities is truer.For target identities, between public records and social networks, enough connections can not be made up completely to synthesize identity.According to some exemplary embodiment, the Information Availability coming from public records is renewable as available new information in analysis.This type of information can comprise date of birth, date of death, address, telephone number, registration etc.
According to exemplary embodiment of the present invention, can utilize various system and method to verify individual identity, description is described.
According to exemplary embodiment of the present invention, Fig. 1 shows verification system 100, and it utilizes first network 124 and second network 122 to verify the identity of target individual 150.Such as, check that the record be associated in the first network 124 of 152 with target individual 150 is to determine the first network individuality 154,156,158 that can be associated by certain target and mode individuality 150.According to exemplary embodiment of the present invention, can analyze relation information in second network 122 with determine by bidirectional relationship (as shown by arrows) and target individual 150 be associated 160 associate second network individuality 156,158,166,168.According to some exemplary embodiment, described association can be one-level connection 162, secondary connection 164 etc., and this depends on the middle quantity connected.
The example of the verification system 100 shown in Fig. 1 describe by first network 124 and second network 122 with the first order be connected 162 (or 1 grades) to be associated with target individual 150 152,160 two individualities 156,158.As the object of this example, also show second network individuality 166, it is associated 160 with first order connection with target individual 150 by second network 122, and second network individual 166 and individual 156 direct correlation 164, described individual 156 are connected with target individual 150 with first network 124 by second network 122 in the mode of first order connection 162.According to an exemplary embodiment, this relationship type trends towards increasing more weight, checking, reliability, intensity etc. to connection.In other words, such a relationship enhances associated connection 162 so that it can be considered to have the connection being less than 1 grade as discussed above, wherein, intensity and the level negative correlation be connected of connection.
Fig. 1 also show a disposal system or controller 102, and it is by connecting or being otherwise configured to process the information obtained from first network 124 and/or second network 122.According to exemplary embodiment of the present invention, described controller 102 can comprise storer 104, one or more processor 106, one or more input/output interface 108 and one or more network interface 110.According to exemplary embodiment, described storer can comprise operating system 112 and data 114.In one exemplary embodiment, described storer 104 can be configured to the multiple image analysis module 118 of carrying one, indicates one or more processor 106 for when analyzing the relation between open network 124 and/or close network 122.The exemplary embodiment of one or more server or computing machine is utilized to be described with reference to accompanying drawing 3 below.
Fig. 2 shows the embodiment of relevant network chart 202,204,206, its to can be used for graphically representing in target identities 208 and other people (such as, spouse, children, late individuality, copartner etc.) and/or between relation.Such as, the first figure 202 can be plotted as the connection of target identities 208 and all related individuals.According to an exemplary embodiment, described first figure 202 can create based on the target identities 208 being in pattern analysis barycenter, wherein, creates node and edge based on the relation comprising described target identities 208.According to an exemplary embodiment of the present invention, a similar process can be carried out to the individuality around the target identities 208 being positioned at pattern analysis barycenter place to determine their network of relation.According to an exemplary embodiment, variously determine that network is (with target identities 208 for barycenter, then be barycenter with related individuals) can be applied, summation, sequence etc., and/or with other network carry out contrasting determining or isolate come from first network Figure 20 2 particular kind of relationship to produce subgraph 204.According to exemplary embodiment, described subgraph 204 can represent the object that two or more heterogeneous networks are common and relation (that is: node and edge).According to exemplary embodiment, initial first figure 202 can carry out redrawing 206 by the 210 total individualities represented, and these type of data can be saved the analysis speed that improves in subsequent treatment.
In the present invention, the various embodiments of Graphic System and method can be presented as the non-transitory computer-readable medium performed by processor.An exemplary embodiment is used in the application of pattern analysis.Fig. 3 shows the schematic diagram of example calculation equipment 300 inner structure.Should be understood that, the structure in Fig. 3 is only for exemplary purpose, and should not be used for the scope of the various embodiments limiting this communication system and method.
The structure of Fig. 3 comprises the CPU (central processing unit) (CPU) 302 of a process computer instruction, one display interface device 304, it serves as communication interface and provides the function of output video, figure, image and text over the display, provides a series of internal control (such as button, text and list) and supports multiple screen size, one provides the keyboard interface 306 of communication interface for keyboard, one provides the indication equipment interface 308 of communication interface for indication equipment, one provides the antennal interface 310 of communication interface for antenna, one provides the network connection interface 312 of communication interface for network, one camera interface 314, it serves as communication interface and is provided for catching the function of the digital picture coming from camera, one audio interface 316, it provides and utilizes a microphone to convert tones into electric signal and utilize a loudspeaker to convert the electrical signal to the communication interface of sound, one random access memory (RAM) 318, wherein, the computer instruction of CPU302 process and data are stored in a volatile memory, one ROM (read-only memory) (ROM) 320, wherein, for system basic functions such as: basic input and output (I/O), start or receive the constant lower-level systems codes such as button from keyboard or data are stored in a nonvolatile memory, the storer of one storage medium 322 or suitable type (such as: RAM, ROM, programmable read only memory (PROM), Erasable Programmable Read Only Memory EPROM (EPROM), Electrically Erasable Read Only Memory (EEPROM), disk, CD, floppy disk, hard disk, packaged type tape, flash drive), wherein, the file stored comprises operating system 324, application program 326 (comprises, such as: web browser application, widget or small tool engine, or other application program, if necessary) and data file 328, for electric power assembly provides suitable alternating current (AC) or the power supply 330 of direct current (DC), and permission equipment 300 receives the telephone subsystems 332 of sound by a telephone network delivery.Described constitution equipment and CPU302 are communicated by bus 334 to each other.
Described CPU302 has the suitable construction as computer processor.In one configuration, the more than one processing unit of described CPU302.Described RAM318 and computer bus 334 interface are so that in software program for execution as provided 2 quick RAM to store to CPU30 when operating system application program and driver.More specifically, be software program for execution, the computer executable program step from storage medium 322 or other medium is loaded in the territory of RAM318 by described CPU302.Data are stored in RAM318, wherein, described data the term of execution accessed by computer CPU 302.In an exemplary configuration, described equipment 300 comprises the flash memory of RAM and 256MB of at least 128MB.
Described storage medium 322 itself can comprise multiple physical drives unit, such as Redundant Array of Independent Disks (RAID) (RAID), floppy disk, flash memory, USB flash memory drives, external fixed disk drive, thumb actuator, carry-on storer, key drives, high-density digital multifunctional dish (HD-DVD) disc drives, internal hard disk drive, Blu-ray disc drive, or one holographic digital data store (HDDS) CD drive, outside miniature dual inline memory module (DIMM) Synchronous Dynamic Random Access Memory (SDRAM), or outside miniature DIMM SDRAM.The computing machine that such computer-readable recording medium allows equipment 300 access to be stored in removable and immovable storage medium performs treatment step, application program etc., to unload data from equipment 300 or to upload data to equipment 300.One computer program such as utilizes the product of communication system can be included in effectively in storage medium 322, and it can comprise a machinable medium.
The process flow diagram referring now to Fig. 4 describes the illustrative methods 400 of checking destination object identity.Described method 400 starts from square frame 402, according to exemplary embodiment of the present invention, it comprise from the first system figure determine one or more hypothesis individual and with described one or more connection suppose between multiple related entities that individuality is associated.At square frame 404, described method 400 comprises determines one or more real entities be associated with destination object from second system figure.At square frame 406, described method comprises the match objects comprising the total real entities be associated with destination object and the related entities be associated with one or more hypothesized identities at least in part based on determined linkage identification.At square frame 408, described method 400 comprises provides the authentication of target identities to indicate based on identified match objects at least in part.Described method terminates after block 408.
According to exemplary embodiment, the connection between one or more hypothesized identities and multiple related entities comprises and being bi-directionally connected.In some of the exemplary embodiments, the connection between one or more hypothesized identities and multiple related entities comprises at least one grade and connects.In some of the exemplary embodiments, one or more the first system figure or second system figure comprises at least one social networks.In some of the exemplary embodiments, one or more the first system figure or second system figure comprises the information coming from public records.
Exemplary embodiment comprise determine one or more hypothesized identities and be associated with described one or more hypothesized identities multiple related entities between at least one grade of chart be connected.Exemplary embodiment also comprise determine to have multiple multiple related entities be associated to hypothesized identities at least partially and one or more expansion charts of the connection of the related expanding inter-entity relevant with multiple related entities; And determine the match objects comprising the total real entities relevant to target identities and expansion entity.Expansion entity can comprise and to be indirectly connected with target or to have those entities being greater than one-level and connecting.
According to exemplary embodiment, attainable technique effect has, such as: create the system and method verifying certain object identity.The attainable technique effect of exemplary embodiment of the present invention is also comprised and is provided for contrasting two or more network to be determined the system and method for individual authenticity by the total relation in described two or more network.
In an exemplary embodiment of the present invention, described verification system 100 and system architecture 300 can comprise the hardware and/or the software and hardware application program that contribute to performing operation arbitrarily of any amount.In the exemplary embodiment, one or more I/O interface contributes to verification system 100, communication connection between system architecture 300 and one or more input-output apparatus.Such as, USB (universal serial bus) port, serial port, disc driver, CD-ROM drive and/or one or more user interface facilities, as, display, keyboard, keypad, mouse, control panel, catalyst panel type display, microphone etc. can be convenient to the user interactions with verification system 100 and system architecture 300.Described one or more I/O interface can be used for receiving from multiple input equipment or collecting data and/or user instruction.The one or more computer processors described in various embodiment of the present invention can be utilized to process the data of reception and/or to be stored in one or more storer.
One or more network interface contributes to verification system 100 and the system architecture 300 input and output connection to one or more suitable networks and/or connection, such as: the connection being convenient to any amount sensor communication relevant to described system.Described one or more network interface also can have to be convenient to be connected to one or more suitable network, such as: for the LAN (Local Area Network) of external unit and/or system communication, wide area network, the Internet, Cellular Networks, radio frequency network, blueteeth network, Wi-Fi wireless network, based on any finite element network of satellite network, any wireless network etc.
As required, embodiments of the invention can comprise as the verification system 100 with more or less assembly as shown in figs. 1 and 3 and system architecture 300.
Be described above according to exemplary embodiment coupling system of the present invention and the block scheme of invention and some embodiment of process flow diagram and/or computer program.Should be understood that, the one or more square frames in block scheme and process flow diagram, and the combination of square frame in block scheme and process flow diagram, can realize respectively by computer-executable program instructions.Similarly, according to some embodiments of the present invention, some square frames of described block scheme and process flow diagram not necessarily need to perform according to shown order, or can not need to perform.
These computer-executable program instructions can be loaded into produce specific machine on multi-purpose computer, special purpose computer, processor or other programmable data treating apparatus, thus the instruction performed on computing machine, processor or other programmable data treating apparatus can create the method for the one or more function of defined in for realization flow block diagram or frame.These computer program instructions also can be stored in computer-readable memory, with specific mode instruct computer or other programmable data treating apparatus, thus the instruction be stored in computer-readable memory produces a kind of goods comprising the one or more function command of defined in realization flow figure or block scheme.Such as, embodiments of the invention can provide a computer program, comprise the computer usable medium wherein with computer readable program code or programmed instruction, described computer readable program code is applicable to perform with the one or more function shown in realization flow block diagram or block scheme.Described computer program instructions is yet loaded into trigger a series of constituent operations of performing on computing machine or other programmable data treating apparatus or step on computing machine or other programmable data treating apparatus, thus the instruction performed on computing machine or other programmable device produces key element for function shown in realization flow block diagram or block scheme or step.
Correspondingly, the square frame support in block scheme and FB(flow block) for perform the method for shown function combination, for performing the combination of the programmed instruction of function shown in the key element of shown function or step and execution.It is to be further understood that, shown in each square frame in block scheme and FB(flow block), and the combination of square frame in block scheme and FB(flow block), realize by special, the hardware based computer system performing specific function, key element or step or specialized hardware and computer instruction combination.
Although some embodiment of the present invention has combined and has currently been considered to the most practical various embodiments and is described, but should be understood that, the present invention is not limited to the disclosed embodiments, but contrary, be intended to cover the various amendment comprised in the scope of appended claims and convert with equal.Although employ particular term in this article, they are only for general and descriptive understanding, instead of for the object limited.
The example for open certain embodiments of the invention used in this instructions, comprise optimal mode, and any person skilled in the art also can be made to implement some embodiment of the present invention, comprise and manufacture and use any device or system, and perform any concrete method.The scope of granting patent of some embodiment of the present invention limited by claims, and can comprise other embodiment occurring in those skilled in the art.These other embodiments be intended to when they have with the literal language difference structural detail of claim or when them, there is the equivalent structural elements with the literal language of claim without substantial differences time, it is in claims scope required for protection.

Claims (21)

1., for verifying a computer executing method for destination object identity, it comprises:
From the first system figure, determine one or more hypothesized identities and connection between multiple Association Identity of being associated with described one or more hypothesized identities;
From second system figure, determine the one or more real entities be associated with destination object;
The match objects of the total real entities be associated with destination object and the related entities be associated with described one or more hypothesized identities is comprised at least in part based on determined linkage identification; And
The instruction of the authentication of destination object is provided based on identified match objects at least in part.
2. computer executing method according to claim 1, is characterized in that: the connection between one or more hypothesized identities and multiple related entities comprises and being bi-directionally connected.
3. computer executing method according to claim 1, is characterized in that: the connection between one or more hypothesized identities and multiple related entities comprises at least first order and connects.
4. computer executing method according to claim 1, is characterized in that: one or more the first system figure or second system figure comprises at least one social networks.
5. computer executing method according to claim 1, is characterized in that: one or more the first system figure or second system figure comprises the information extracted from public records.
6. computer executing method according to claim 1, is characterized in that: also comprise determine one or more hypothesized identities and be associated with this one or more hypothesized identities multiple related entities between the chart that is connected of at least one first order.
7. computer executing method according to claim 1, is characterized in that: also comprise:
Determine to have the multiple related entities be associated with hypothesized identities at least partially and the one or more expansion charts associating the connection expanding inter-entity be associated with multiple related entities; And
Identify the total real entities comprising and being associated with target identities and the match objects expanding entity.
8. a system comprises:
At least one is for storing the storer of data and computer executable instructions; And
At least one processor, it is configured to access at least one storer and be also configured to computer instructions, with
From the first system figure, determine one or more hypothesized identities and connection between multiple related entities of being associated with described one or more hypothesized identities;
From second system figure, determine the one or more real entities be associated with target identities;
The match objects of the total real entities be associated with target identities and the related entities be associated with one or more hypothesized identities is comprised at least in part based on determined linkage identification; And
The instruction of the checking of destination object identity is provided based on determined match objects at least in part.
9. system according to claim 8, is characterized in that: the connection between described one or more hypothesized identities and multiple related entities comprises and being bi-directionally connected.
10. system according to claim 8, is characterized in that: the connection between described one or more hypothesized identities and multiple related entities comprises at least first order and connects.
11. systems according to claim 8, is characterized in that: one or more the first system figure or second system figure comprises at least one social networks.
12. systems according to claim 8, is characterized in that: one or more the first system figure or second system figure comprises the information extracted from public records.
13. systems according to claim 8, is characterized in that: at least one processor described is also configured to: determine one or more hypothesized identities and chart that at least one first order between multiple related entities of being connected with described one or more hypothesized identities is connected.
14. will go the system described in 8 according to right, it is characterized in that: at least one processor described is also configured to:
Determine to have the multiple related entities be associated with hypothesized identities at least partially and the one or more expansion charts associating the connection expanding inter-entity be associated with multiple related entities; And
Identify the total real entity comprising and being associated with target identities and the match objects expanding entity.
15. 1 kinds store the instruction non-transitory computer-readable medium to implement the method performed by one or more processor, and it comprises:
From the first system figure, determine one or more hypothesized identities and connection between multiple related entities of being associated with this one or more hypothesized identities;
From second system figure, determine the one or more real entities be associated with target identities;
The match objects of the total real entities be associated with target identities and the related entities be associated with one or more hypothesized identities is comprised at least in part based on determined linkage identification; And
The instruction of the authentication of destination object is provided based on determined match objects at least in part.
16. computer-readable mediums according to claim 15, its feature is being: the connection between one or more hypothesized identities and multiple related entities comprises and being bi-directionally connected.
17. computer-readable mediums according to claim 15, is characterized in that: at least first order that comprises of the connection between one or more hypothesized identities and multiple related entities connects.
18. computer-readable mediums according to claim 15, is characterized in that: one or more the first system figure or second system figure comprises at least one social networks.
19. computer-readable mediums according to claim 15, is characterized in that: one or more the first system figure or second system figure comprises the information extracted from public records.
20. computer-readable mediums according to claim 15, is characterized in that: also comprise determine one or more hypothesized identities and be associated with this one or more hypothesized identities multiple related entities between the chart that is connected of at least one first order.
21. computer-readable mediums according to claim 15, is characterized in that: also comprise:
Determine to have multiple related entities be associated with hypothesized identities at least partially and the one or more expansion charts associating the connection expanding inter-entity be associated with multiple related entities; And
Identify the total real entity comprising and being associated with target identities and the match objects expanding entity.
CN201380035592.4A 2012-07-03 2013-06-27 The system and method for authentication is carried out using social networks Active CN104487993B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US13/541,092 US8549590B1 (en) 2012-07-03 2012-07-03 Systems and methods for identity authentication using a social network
US13/541,092 2012-07-03
PCT/US2013/048081 WO2014008079A2 (en) 2012-07-03 2013-06-27 Systems and methods for identity authentication using a social network

Publications (2)

Publication Number Publication Date
CN104487993A true CN104487993A (en) 2015-04-01
CN104487993B CN104487993B (en) 2018-03-13

Family

ID=49230035

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201380035592.4A Active CN104487993B (en) 2012-07-03 2013-06-27 The system and method for authentication is carried out using social networks

Country Status (6)

Country Link
US (1) US8549590B1 (en)
CN (1) CN104487993B (en)
BR (1) BR112015000104A2 (en)
GB (1) GB2518099A (en)
IN (1) IN2015DN00318A (en)
WO (1) WO2014008079A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107993142A (en) * 2017-11-23 2018-05-04 搜易贷(北京)金融信息服务有限公司 A kind of anti-risk of fraud control system of finance
CN108369636A (en) * 2015-11-27 2018-08-03 盖赫盖斯特公司 For certification and/or the method for check object integrality
CN110781229A (en) * 2018-07-12 2020-02-11 律商联讯风险解决方案公司 System and method for entity network analysis

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8312033B1 (en) 2008-06-26 2012-11-13 Experian Marketing Solutions, Inc. Systems and methods for providing an integrated identifier
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
EP2676197B1 (en) 2011-02-18 2018-11-28 CSidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US9607336B1 (en) 2011-06-16 2017-03-28 Consumerinfo.Com, Inc. Providing credit inquiry alerts
US11030562B1 (en) 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
US8812387B1 (en) 2013-03-14 2014-08-19 Csidentity Corporation System and method for identifying related credit inquiries
US10664936B2 (en) 2013-03-15 2020-05-26 Csidentity Corporation Authentication systems and methods for on-demand products
US9633322B1 (en) 2013-03-15 2017-04-25 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US9721147B1 (en) 2013-05-23 2017-08-01 Consumerinfo.Com, Inc. Digital identity
US9386004B2 (en) 2013-10-23 2016-07-05 Qualcomm Incorporated Peer based authentication
US10373240B1 (en) 2014-04-25 2019-08-06 Csidentity Corporation Systems, methods and computer-program products for eligibility verification
US10339527B1 (en) 2014-10-31 2019-07-02 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US11151468B1 (en) 2015-07-02 2021-10-19 Experian Information Solutions, Inc. Behavior analysis using distributed representations of event data
US9633187B1 (en) * 2015-12-30 2017-04-25 Dmitry Kozko Self-photograph verification for communication and content access
US10699028B1 (en) 2017-09-28 2020-06-30 Csidentity Corporation Identity security architecture systems and methods
US10896472B1 (en) 2017-11-14 2021-01-19 Csidentity Corporation Security and identity verification system and architecture
US10911234B2 (en) 2018-06-22 2021-02-02 Experian Information Solutions, Inc. System and method for a token gateway environment
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data
CN111444440B (en) * 2020-06-15 2020-09-29 腾讯科技(深圳)有限公司 Identity information identification method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090119299A1 (en) * 2007-11-02 2009-05-07 Hue Rhodes Online Identity Management and Identity Verification
CN102035846A (en) * 2010-12-22 2011-04-27 北京航空航天大学 Social network user identity authentication method based on relation statement
CN102171712A (en) * 2008-10-03 2011-08-31 微软公司 Identity and authentication system using aliases
US20120159647A1 (en) * 2010-12-17 2012-06-21 Aleksey Sanin Systems and methods for user identity verification and risk analysis using available social and personal data

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080033941A1 (en) 2006-08-07 2008-02-07 Dale Parrish Verfied network identity with authenticated biographical information
US20110119230A1 (en) 2009-10-07 2011-05-19 Thomas Zuber Method for automatically associating contacts in an online social network
US20120215597A1 (en) * 2011-02-17 2012-08-23 Bank Of America Corporation System for analyzing social media behavioral influence
US9311462B1 (en) * 2011-03-04 2016-04-12 Zynga Inc. Cross platform social networking authentication system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090119299A1 (en) * 2007-11-02 2009-05-07 Hue Rhodes Online Identity Management and Identity Verification
CN102171712A (en) * 2008-10-03 2011-08-31 微软公司 Identity and authentication system using aliases
US20120159647A1 (en) * 2010-12-17 2012-06-21 Aleksey Sanin Systems and methods for user identity verification and risk analysis using available social and personal data
CN102035846A (en) * 2010-12-22 2011-04-27 北京航空航天大学 Social network user identity authentication method based on relation statement

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108369636A (en) * 2015-11-27 2018-08-03 盖赫盖斯特公司 For certification and/or the method for check object integrality
CN108369636B (en) * 2015-11-27 2024-03-08 盖赫盖斯特公司 Method for authenticating and/or checking the integrity of an object
CN107993142A (en) * 2017-11-23 2018-05-04 搜易贷(北京)金融信息服务有限公司 A kind of anti-risk of fraud control system of finance
CN110781229A (en) * 2018-07-12 2020-02-11 律商联讯风险解决方案公司 System and method for entity network analysis

Also Published As

Publication number Publication date
WO2014008079A2 (en) 2014-01-09
WO2014008079A3 (en) 2014-03-13
CN104487993B (en) 2018-03-13
US8549590B1 (en) 2013-10-01
GB2518099A (en) 2015-03-11
IN2015DN00318A (en) 2015-06-12
BR112015000104A2 (en) 2017-06-27

Similar Documents

Publication Publication Date Title
CN104487993A (en) Systems and methods for identity authentication using a social network
Rahman et al. Blockchain and IoT-based cognitive edge framework for sharing economy services in a smart city
CN105337928B (en) Method for identifying ID, safety protection problem generation method and device
Nguyen et al. Towards a blockchain-based certificate authentication system in Vietnam
US10521572B2 (en) Systems and methods for improving KBA identity authentication questions
TWI668655B (en) Risk information output, risk information construction method and device
US20180262493A1 (en) Systems and methods for providing block chain or distributed ledger-based entity identity and relationship verification
CN103827899B (en) Data center resource is distributed
CN110326251A (en) The system and method that the general dispersion solution of user is verified using cross validation feature are provided
US10970322B2 (en) Training an artificial intelligence to generate an answer to a query based on an answer table pattern
Hakak et al. Recent advances in blockchain technology: A survey on applications and challenges
JP2017507408A5 (en)
US9888110B2 (en) System and method for automated adaptation and improvement of speaker authentication in a voice biometric system environment
CN109598147A (en) Data processing method and device based on block chain, electronic equipment
US10891626B2 (en) Systems and methods for identity verification
CN109828958A (en) Event recording method and record system based on block chain
Sujatha et al. Optimized digital transformation in government services with blockchain
CN108985930A (en) Information processing method and device, block chain node and storage medium
CN109903055A (en) Merchandise control method, apparatus, computer installation and storage medium
CN109598208B (en) Portrait verification method and device
CN110414260B (en) Data access method, device, system and storage medium
CN202956789U (en) Information processing system used for electronic business
CN112200592B (en) Method, device and equipment for identifying vacant company
CN109087053A (en) Synergetic office work processing method, device, equipment and medium based on associated topologies figure
CN113378183A (en) User privacy protection method, device and system based on multi-party security calculation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant